pose a complete and secure decentralized system that
preserves user privacy, since no computation is made
at a central server that could gather private data. In
addition, the system enables forensics logging within
a network made exclusively of mobile device: by use
of data hash stored in a lightweight distributed block-
chain through Smart Contract, we allow each user to
be able to prove its own data integrity. Furthermore,
this blockchain is used to retrieve nodes public keys
and thus, authenticate and decrypt packets.
5.1 Discussion on Mobile Computing
Given the nature of our proposed solution, we foresee
several problems and points that must be addressed:
• Given the communication window between no-
des, the data exchanged must be as concise as pos-
sible. To that end, we can prune the data to be
shared to include only latest gathered road infor-
mation.
• The computation of the navigation path might be
a challenge for mobile devices. However, nowa-
days smartphones can handle heavy computatio-
nal burden and finding the shortest path is a well
known and optimized algorithm.
• We encrypt the data exchange between nodes with
asymmetric encryption. Such encryption is howe-
ver computationally expensive.
• The frequency of smart contract execution and
ledger update will directly affect the efficiency of
the proposed solution but also the power and com-
putational requirements.
5.2 Future Work
The solution that we propose is yet to be developed.
The work will question different sensitive subjects
specific to VANET limitations. For instance, we fo-
resee that the size of the database to be shared over a
really small amount of time might be a challenge, or
that the computing power available on mobile device
might not be sufficient to run Dijkstra or asymme-
tric cryptography. The latest project break-in invol-
ves a complete different approach. Indeed, the hyper-
ledger Fabric functionalities allow to store key/value
pairs alongside the ledger of transactions as permissi-
oned blockchain. A user would then directly submit
a new transaction containing a new measured speed
for a certain road id as transaction. Such scheme ena-
ble forensics through transactions crawling and dyn-
amic rerouting through database query. However, the
scalability of the system for mobile application is yet
unknown.
REFERENCES
Beresford, A. R. and Stajano, F. (2004). Mix zones: User
privacy in location-aware services. In Pervasive Com-
puting and Communications Workshops, 2004. Pro-
ceedings of the Second IEEE Annual Conference on,
pages 127–131. IEEE.
Brecht, W. (2012). White-box cryptography: hiding keys in
software. NAGRA Kudelski Group.
Dijkstra, E. W. (1959). A note on two problems in connex-
ion with graphs. Numerische mathematik, 1(1):269–
271.
Directive, E. (1995). 95/46/ec of the european parliament
and of the council of 24 october 1995 on the protection
of individuals with regard to the processing of perso-
nal data and on the free movement of such data. Offi-
cial Journal of the EC, 23(6).
EU (2016). Directive (EU) 2016/680 of the Eu-
ropean Parliament and of the Council of 27
April 2016. http://eur-lex.europa.eu/legal-
content/EN/ALL/?uri=CELEX:32016L0680.
Funai, C., Tapparello, C., and Heinzelman, W. (2015). Sup-
porting multi-hop device-to-device networks through
wifi direct multi-group networking. arXiv preprint
arXiv:1601.00028.
Garip, M. T., Gursoy, M. E., Reiher, P., and Gerla, M.
(2015). Scalable reactive vehicle-to-vehicle conges-
tion avoidance mechanism. In Consumer Communica-
tions and Networking Conference (CCNC), 2015 12th
Annual IEEE, pages 943–948. IEEE.
GoTenna (2016). GoTenna. www.gotenna.com. [Online;
accessed 21-November-2017].
Grignard, A., Taillandier, P., Gaudou, B., Vo, D. A., Huynh,
N. Q., and Drogoul, A. (2013). Gama 1.6: Advan-
cing the art of complex agent-based modeling and si-
mulation. In International Conference on Principles
and Practice of Multi-Agent Systems, pages 117–131.
Springer.
Hadiwardoyo, S. A., Patra, S., Calafate, C. T., Cano, J.-C.,
and Manzoni, P. (2017). An android its driving safety
application based on vehicle-to-vehicle (v2v) commu-
nications. In Computer Communication and Networks
(ICCCN), 2017 26th International Conference on, pa-
ges 1–6. IEEE.
Kaul, A., Obraczka, K., Santos, M., Rothenberg, C., and
Turletti, T. (2017). Dynamically distributed net-
work control for message dissemination in its. In
IEEE/ACM DS-RT 2017-21st International Sympo-
sium on Distributed Simulation and Real Time Appli-
cations.
Leiding, B., Memarmoshrefi, P., and Hogrefe, D. (2016).
Self-managed and blockchain-based vehicular ad-hoc
networks. In Proceedings of the 2016 ACM Interna-
tional Joint Conference on Pervasive and Ubiquitous
Computing: Adjunct, pages 137–140. ACM.
Leontiadis, I., Marfia, G., Mack, D., Pau, G., Mascolo, C.,
and Gerla, M. (2011). On the effectiveness of an op-
portunistic traffic management system for vehicular
networks. IEEE Transactions on Intelligent Transpor-
tation Systems, 12(4):1537–1548.
VEHITS 2018 - 4th International Conference on Vehicle Technology and Intelligent Transport Systems
460